Skip to main content

Showing 1–16 of 16 results for author: Wilhelm, M

  1. arXiv:2405.06107  [pdf, other

    cs.LG cs.SC hep-ph hep-th stat.ML

    Transforming the Bootstrap: Using Transformers to Compute Scattering Amplitudes in Planar N = 4 Super Yang-Mills Theory

    Authors: Tianji Cai, Garrett W. Merz, François Charton, Niklas Nolte, Matthias Wilhelm, Kyle Cranmer, Lance J. Dixon

    Abstract: We pursue the use of deep learning methods to improve state-of-the-art computations in theoretical high-energy physics. Planar N = 4 Super Yang-Mills theory is a close cousin to the theory that describes Higgs boson production at the Large Hadron Collider; its scattering amplitudes are large mathematical expressions containing integer coefficients. In this paper, we apply Transformers to predict t… ▽ More

    Submitted 9 May, 2024; originally announced May 2024.

    Comments: 26+10 pages, 9 figures, 7 tables, application of machine learning aimed at physics and machine learning audience

    Report number: SLAC-PUB-17774

  2. arXiv:2302.08870  [pdf, other

    cs.DS

    Partitioning the Bags of a Tree Decomposition Into Cliques

    Authors: Thomas Bläsius, Maximilian Katzmann, Marcus Wilhelm

    Abstract: We consider a variant of treewidth that we call clique-partitioned treewidth in which each bag is partitioned into cliques. This is motivated by the recent development of FPT-algorithms based on similar parameters for various problems. With this paper, we take a first step towards computing clique-partitioned tree decompositions. Our focus lies on the subproblem of computing clique partitions, i… ▽ More

    Submitted 17 February, 2023; originally announced February 2023.

    ACM Class: G.2.2; F.2.2; G.2.1

  3. arXiv:2209.15300  [pdf, other

    cs.DS

    Deterministic Performance Guarantees for Bidirectional BFS on Real-World Networks

    Authors: Thomas Bläsius, Marcus Wilhelm

    Abstract: A common technique to speed up shortest path queries in graphs is to use a bidirectional search, i.e., performing a forward search from the start and a backward search from the destination until a common vertex on a shortest path is found. In practice, this has a tremendous impact on the performance on some real-world networks, while it only seems to save a constant factor on other types of networ… ▽ More

    Submitted 3 April, 2023; v1 submitted 30 September, 2022; originally announced September 2022.

    Comments: full version of paper (to be) presented at 34th International Workshop on Combinatorial Algorithms (IWOCA 2023)

    MSC Class: 68W40 ACM Class: F.2.2

  4. arXiv:2208.06321  [pdf, other

    cs.DC math.OC

    Modeling Task Mapping for Data-intensive Applications in Heterogeneous Systems

    Authors: Martin Wilhelm, Hanna Geppert, Anna Drewes, Thilo Pionteck

    Abstract: We introduce a new model for the task mapping problem to aid in the systematic design of algorithms for heterogeneous systems including, but not limited to, CPUs, GPUs and FPGAs. A special focus is set on the communication between the devices, its influence on parallel execution, as well as on device-specific differences regarding parallelizability and streamability. We show how this model can be… ▽ More

    Submitted 12 August, 2022; originally announced August 2022.

  5. arXiv:2110.15214  [pdf, ps, other

    cs.AI

    Conditional Inference and Activation of Knowledge Entities in ACT-R

    Authors: Marco Wilhelm, Diana Howey, Gabriele Kern-Isberner, Kai Sauerwald, Christoph Beierle

    Abstract: Activation-based conditional inference applies conditional reasoning to ACT-R, a cognitive architecture developed to formalize human reasoning. The idea of activation-based conditional inference is to determine a reasonable subset of a conditional belief base in order to draw inductive inferences in time. Central to activation-based conditional inference is the activation function which assigns to… ▽ More

    Submitted 28 October, 2021; originally announced October 2021.

  6. arXiv:1911.02453  [pdf, other

    cs.DS

    From Symmetry to Asymmetry: Generalizing TSP Approximations by Parametrization

    Authors: Lukas Behrendt, Katrin Casel, Tobias Friedrich, J. A. Gregor Lagodzinski, Alexander Löser, Marcus Wilhelm

    Abstract: We generalize the tree doubling and Christofides algorithm, the two most common approximations for TSP, to parameterized approximations for ATSP. The parameters we consider for the respective parameterizations are upper bounded by the number of asymmetric distances in the given instance, which yields algorithms to efficiently compute constant factor approximations also for moderately asymmetric TS… ▽ More

    Submitted 26 February, 2020; v1 submitted 6 November, 2019; originally announced November 2019.

  7. Insights into the Mind of a Trojan Designer: The Challenge to Integrate a Trojan into the Bitstream

    Authors: Maik Ender, Pawel Swierczynski, Sebastian Wallat, Matthias Wilhelm, Paul Martin Knopp, Christof Paar

    Abstract: The threat of inserting hardware Trojans during the design, production, or in-field poses a danger for integrated circuits in real-world applications. A particular critical case of hardware Trojans is the malicious manipulation of third-party FPGA configurations. In addition to attack vectors during the design process, FPGAs can be infiltrated in a non-invasive manner after shipment through altera… ▽ More

    Submitted 1 October, 2019; originally announced October 2019.

    Journal ref: ASPDAC 2019 Proceedings of the 24th Asia and South Pacific Design Automation Conference Pages 112-119

  8. arXiv:1907.04246  [pdf, other

    cs.CR cs.LG

    Security for Distributed Deep Neural Networks Towards Data Confidentiality & Intellectual Property Protection

    Authors: Laurent Gomez, Marcus Wilhelm, José Márquez, Patrick Duverger

    Abstract: Current developments in Enterprise Systems observe a paradigm shift, moving the needle from the backend to the edge sectors of those; by distributing data, decentralizing applications and integrating novel components seamlessly to the central systems. Distributively deployed AI capabilities will thrust this transition. Several non-functional requirements arise along with these developments, securi… ▽ More

    Submitted 9 July, 2019; originally announced July 2019.

    Journal ref: Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, ICETE 2019

  9. arXiv:1904.02034  [pdf, other

    cs.CG cs.DS math.NA

    Internal versus external balancing in the evaluation of graph-based number types

    Authors: Hanna Geppert, Martin Wilhelm

    Abstract: Number types for exact computation are usually based on directed acyclic graphs. A poor graph structure can impair the efficency of their evaluation. In such cases the performance of a number type can be drastically improved by restructuring the graph or by internally balancing error bounds with respect to the graph's structure. We compare advantages and disadvantages of these two concepts both th… ▽ More

    Submitted 21 August, 2019; v1 submitted 3 April, 2019; originally announced April 2019.

  10. arXiv:1807.04181  [pdf, other

    cs.CG math.NA

    On error representation in exact-decisions number types

    Authors: Martin Wilhelm

    Abstract: Accuracy-driven computation is a strategy widely used in exact-decisions number types for robust geometric algorithms. This work provides an overview on the usage of error bounds in accuracy-driven computation, compares different approaches on the representation and computation of these error bounds and points out some caveats. The stated claims are supported by experiments.

    Submitted 11 July, 2018; originally announced July 2018.

  11. arXiv:1804.03256  [pdf, other

    cs.CG cs.DC cs.DS cs.PF

    Restructuring expression dags for efficient parallelization

    Authors: Martin Wilhelm

    Abstract: In the field of robust geometric computation it is often necessary to make exact decisions based on inexact floating-point arithmetic. One common approach is to store the computation history in an arithmetic expression dag and to re-evaluate the expression with increasing precision until an exact decision can be made. We show that exact-decisions number types based on expression dags can be evalua… ▽ More

    Submitted 9 April, 2018; originally announced April 2018.

  12. arXiv:1802.06712  [pdf, ps, other

    cs.DC cs.CG

    Multithreading for the expression-dag-based number type Real_algebraic

    Authors: Martin Wilhelm

    Abstract: Many algorithms, especially in the field of computational geometry, are based on the premise that arithmetic operations are performed exactly. Real machines are based on inexact floating-point arithmetic. Various number types have been developed to close this gap by providing exact computation or ensuring exact decisions. In this report we describe the implementation of an extension to the exact-d… ▽ More

    Submitted 3 April, 2018; v1 submitted 19 February, 2018; originally announced February 2018.

    Comments: Technical Report

    Report number: FIN-001-2018

  13. arXiv:1710.04576  [pdf, ps, other

    cs.CG cs.DS math.NA

    Balancing expression dags for more efficient lazy adaptive evaluation

    Authors: Martin Wilhelm

    Abstract: Arithmetic expression dags are widely applied in robust geometric computing. In this paper we restructure expression dags by balancing consecutive additions or multiplications. We predict an asymptotic improvement in running time and experimentally confirm the theoretical results. Finally, we discuss some pitfalls of the approach resulting from changes in evaluation order.

    Submitted 12 October, 2017; originally announced October 2017.

    Comments: MACIS 2017 Submission

  14. An Analytical Model of Packet Collisions in IEEE 802.15.4 Wireless Networks

    Authors: Matthias Wilhelm, Vincent Lenders, Jens B. Schmitt

    Abstract: Numerous studies showed that concurrent transmissions can boost wireless network performance despite collisions. While these works provide empirical evidence that concurrent transmissions may be received reliably, existing signal capture models only partially explain the root causes of this phenomenon. We present a comprehensive mathematical model that reveals the reasons and provides insights on… ▽ More

    Submitted 18 August, 2014; v1 submitted 19 September, 2013; originally announced September 2013.

    Comments: Accepted for publication in the IEEE Transactions on Wireless Communications under the title "On the Reception of Concurrent Transmissions in Wireless Sensor Networks."

  15. arXiv:1305.4038  [pdf, other

    cs.NI

    Air Dominance in Sensor Networks: Guarding Sensor Motes using Selective Interference

    Authors: Matthias Wilhelm, Ivan Martinovic, Jens B. Schmitt, Vincent Lenders

    Abstract: Securing wireless sensor networks (WSNs) is a hard problem. In particular, network access control is notoriously difficult to achieve due to the inherent broadcast characteristics of wireless communications: an attacker can easily target any node in its transmission range and affect large parts of a sensor network simultaneously. In this paper, we therefore propose a distributed guardian system to… ▽ More

    Submitted 17 May, 2013; originally announced May 2013.

    Comments: 16 pages, 13 figures

  16. Key Generation in Wireless Sensor Networks Based on Frequency-selective Channels - Design, Implementation, and Analysis

    Authors: Matthias Wilhelm, Ivan Martinovic, Jens B. Schmitt

    Abstract: Key management in wireless sensor networks faces several new challenges. The scale, resource limitations, and new threats such as node capture necessitate the use of an on-line key generation by the nodes themselves. However, the cost of such schemes is high since their secrecy is based on computational complexity. Recently, several research contributions justified that the wireless channel itself… ▽ More

    Submitted 5 May, 2010; originally announced May 2010.

    Comments: Submitted to IEEE Transactions on Dependable and Secure Computing